In this paper, the homotopy perturbation method (HPM) is presented for treating a linear system of second-kind mixed Volterra-Fredholm integral equations. The method is based on constructing the series whose summation is the solution of the considered system. Convergence of constructed series is discussed and its proof is given; also, the error estimation is obtained. Algorithm is suggested and applied on several examples and the results are computed by using MATLAB (R2015a). To show the accuracy of the results and the effectiveness of the method, the approximate solutions of some examples are compared with the exact solution by computing the absolute errors.
The problem of Bi-level programming is to reduce or maximize the function of the target by having another target function within the constraints. This problem has received a great deal of attention in the programming community due to the proliferation of applications and the use of evolutionary algorithms in addressing this kind of problem. Two non-linear bi-level programming methods are used in this paper. The goal is to achieve the optimal solution through the simulation method using the Monte Carlo method using different small and large sample sizes. The research reached the Branch Bound algorithm was preferred in solving the problem of non-linear two-level programming this is because the results were better.
The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente
... Show MoreIn this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.
In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also fou
... Show MoreThe basic solution to overcome difficult issues related to huge size of digital images is to recruited image compression techniques to reduce images size for efficient storage and fast transmission. In this paper, a new scheme of pixel base technique is proposed for grayscale image compression that implicitly utilize hybrid techniques of spatial modelling base technique of minimum residual along with transformed technique of Discrete Wavelet Transform (DWT) that also impels mixed between lossless and lossy techniques to ensure highly performance in terms of compression ratio and quality. The proposed technique has been applied on a set of standard test images and the results obtained are significantly encourage compared with Joint P
... Show MoreA gracious invitation was extended to us on 9/11/2002 AD, by the University of Tikrit / the Preparatory Committee, for a symposium (Sheikh Daoud Al-Tikriti, and his Scientific Effects), to participate in it.
The symposium was scheduled to be held on the 25th and 26th of March 2003 AD, but God Almighty decreed that our country be occupied, so the Preparatory Committee set another date for the symposium on 10/21/2003 AD.
It was not possible for the symposium to be held until 25-26/4/2004 AD, and many researchers attended, who were assigned to investigate some manuscripts of Sheikh Dawood (may God have mercy on him) or to write about his personal and scientific biography.
And God (Glory be to Him) did not enable us to attend, becau
Loanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreA QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.